Computational processes
|
|
- David Small
- 5 years ago
- Views:
Transcription
1 Spring 2010 Computational processes in living cells Lecture 6: Gene assembly as a pointer reduction in MDS descriptors Vladimir Rogojin Department of IT, Abo Akademi
2 Model forming To formalize gene assembly we need two steps: Formalize the DNA molecules that constitute the micronuclear, intermediate, and the assembled gene Formalize the way these objects are processed in gene assembly In our formalization we will keep a minimum of information that is still able to represent the essentials of the gene structure and keep track of gene assembly WE FORMALIZE: MIC gene Intermediate gene MAC gene 2
3 Formalizing the genes Idea: Represent the gene structure through the sequence of MDSs and pointers Represent the gene assembly as a process of sorting of MDSs, of composing bigger MDSs from its smaller parts and of pointer removals 3
4 First level: genes as MDS descriptors Example: gene actin I in S.Nova. Formalization (π 3, π 4 ) (π 4, π 5 ) (π 6, π 7 ) (π 5, π 6 ) (π 7, π 8 ) (π 9, e) (π2, π3) (b, π 2 ) (π 8, π M3 I1 M4 I2 M6 I3 M5 I4 M7 I5 M9 I6 π 3 π 4 π 4 π 5 π 6 π 7 π 5 π 6 π 7 π 8 π 9 e π3 M2 π2 I7 b M1 π 2 I8π 8 M8 (π 3, π 8 ) (π 9, e) (π2, π3) (b, π 2 ) (π 8, π 9 ) M3 M4 M5 M6 M7 I5 M9 I6 π 3 π 8 π 8 e π3 M2 π2 I7 M1 I8 M8 b π 2 π 8 π 9 (b, e) b M1 M2 M3 M4 M5 M6 M7 M8 M9 e 4
5 Genes as MDS descriptors M3 M4 M6 M5 M7 M9 M2 M1 M8 MDS descriptor: (3,4)(4,5)(6,7)(5,6)(7,8)(9,e)(-3,-2)(b,2)(8,9) 5
6 Level 1 Abstraction from pointers Second level: genes as legal Real genes strings Generic formalism: MDS arrangements MDS M i,j Abstraction from real DNA sequences, IESs and MDS content Abstraction from order numbers Permutations (we will not consider them any further during the course) Level 2 MDS descriptors MDS (i,j+1) Abstraction from MDSs Strings MDS i j+1 6
7 Representing genes as legal strings Note the degree of simplification at this level: from the nucleotide sequence of the gene we only represent at this level the order in which pointers (but not markers) occur along the sequence M3 M4 M6 M5 M7 M9 M2 M1 M8 Arrangements: M 3 M 4 M 6 M 5 M 7 M 9 M 2 M 1 M 8 MDS descriptor: (3,4)(4,5)(6,7)(5,6)(7,8)(9,e)(3,2)(b,2)(8,9) Legal string: denoted also as
8 Level 1 Third level: genes as signed graphs Real genes Abstraction from pointers Generic formalism: MDS arrangements MDS M i,j Abstraction from real DNA sequences, IESs and MDS content Abstraction from order numbers Permutations (we will not consider them any further during the course) MDS descriptors MDS (i,j+1) Level 2 Abstraction from MDSs Strings MDS i j+1 Abstraction from pointer sequence Level 3 Graphs 2 overlapping pointers p,q an edge between p,q 8
9 Signed overlap graphs: Example M3 M4 M6 M5 M7 M9 M2 M1 M8 Generic: M 3 M 4 M 6 M 5 M 7 M 9 M 2 M 1 M 8 MDS descriptor: (3,4)(4,5)(6,7)(5,6)(7,8)(9,e)(3,2)(b,2)(8,9) Legal string: denoted also as Overlap graph: 9
10 First level: MDS descriptors This is already a big abstraction from the real gene structure At this point we completely ignore the IESs and the bodies of the MDSs, i.e., most of the nucleotide sequence of the micronuclear gene However, the information that we do keep is sufficient to keep track of all intermediary structures produced in the gene assemble and to keep track of the assembly itself One more simplification: the real DNA sequence of each pointer is not important as long as we know their positions on the gene What is essential and we must keep is that the nucleotide sequence that is the incoming pointer of MDS i is identical with the nucleotide sequence making the outcoming pointer of MDS i-1 Remember also that MDS 1 starts with a beginning marker and the last MDS ends with an ending marker 10
11 First level: MDS descriptors Idea: denote each pointer by an integer: MDS i - (i,i+1), first MDS - (b,2), last MDS - (k,e) Note: the integers are used here just as a notation for a DNA sequence Example: M 3 is ACTGTTTAAA TATAATCGTA M 4 is CGTATAATA AATCTAGAGG MDS M 3 (3,4), where 3 stands for ACTG and 4 stands for CGTA MDS M 4 (4,5), where 4 stands for CGTA and 5 stands for CTAGAGG 11
12 Formalizing the process Formalize these intuitive ideas: MDS descriptors Next step: translate the molecular operation to MDS descriptors Based on this formal system prove the universality result: Any micronuclear gene can be assembled by a sequences of ld, hi, and dlad. 12
13 Mathematical preliminaries Alphabet: set of letters String over alphabet A: any sequence of letters from A Length of the string u: the number of letters in u Empty string: string of length 0 v is a substring of u if u=w 1 vw 2, v is proper if different from u and the empty string v is a permutation of u if u=a 1 a 2 a n, with a i A and v=a i1 a i2 a in, where (i 1,i 2,,i n ) is a permutation of (1,2,,n) 13
14 Mathematical preliminaries For an alphabet A, consider its signed copy A={a a A} A signed string over A is a string over A A Convention: a=a We say that a letter a A A occurs in the signed string u if either a or a occurs in u dom(u) A is the set of (unsigned) letters that occur in u if u=a 1 a 2 a n, a i A A, then its inversion is u=a n a 2 a 1, where a=a v is a signed permutation of u=a 1 a 2 a n, a i A if v=a i1 a i2 a in, where (i 1,i 2,,i n ) is a permutation of (1,2,,n) and a k {a k,a k } 14
15 MDS arrangements Step 1: drop the IESs, denote the MDSs as M i,j : Assume throughout this lecture that we are working on a gene having k MDSs in its micronuclear version; k is fixed for this lecture We use the alphabet Θ k ={ M i,j 1< i j < k } U { M 1,j 1 j < k } U { M i,k 1 < j k } U { M 1,k }. Letters M i,i are also denoted as M i Example: M 1, M 1,2, M 3, M 4,k letters from Θ k M 1, M 1,2, M 3, M 4,k letters from Θ k M 3,1,M 4,3 - not in Θ k 15
16 MDS arrangements Any signed string over Θ k is called an MDS arrangement We say that a signed string u over Θ k is an orthodox MDS arrangement if it is of the form u=m 1,i2-1 M i2,i3-1 M in,k Example: M 1,4 M 5,9 M 10 Any signed permutation of u is called a realistic arrangement Any signed permutation of M 1 M 2 M k is called a micronuclear arrangement 16
17 Generic formalism: Example The actin I gene in S.nova can be represented as M 3 M 4 M 6 M 5 M 7 M 9 M 2 M 1 M 8 by omitting all IESs Actin I in S.trifallax: M 3 M 4 M 6 M 5 M 7 M 9 M 10 M 2 M 1 M 8 17
18 Generic formalism: Example M 1,4 M 5,5 M 6,8 is an orthodox MDS sequence M 1,4 and M 6,8 are composite MDSs, M 5,5 is elementary and can be denoted also as M 5 M 3,5 M 9,11 M 1,2 M 12 M 6,8 is realistic It is a signed permutation of the orthodox MDS sequence M 1,2 M 3,5 M 6,8 M 9,11 M 12 M 1 M 1 is not a realistic MDS sequence 18
19 MDS descriptors Step 2 of the formalization Keep each MDS by its pair of pointers/markers; denote each pointer by an integer Alphabets: k ={2, 3,, k}, k ={2, 3,, k} Π k = k k Ψ={b,e,b,e} the set of markers Note: each integer and marker is a notation for a DNA sequence For any pointer p Π k, its pointer set is {p,p} 19
20 From generic formalism to MDS descriptors Represent each MDS by its pair of pointers each MDS M i will be represented as (i,i+1) and its inversion M i as (i+1,i) The first and the last MDSs are special represent M 1 as (b,2), M 1 as (2,b), M k as (k,e), and M k as (e,k), where b/e are special beginning/ ending markers This leads to the so-called MDS-descriptors MDS arrangement: M 3 M 4 M 6 M 5 M 7 M 9 M 2 M 1 M 8 MDS descriptor: (3,4)(4,5)(6,7)(5,6)(7,8)(9,e)(3,2)(b,2)(8,9) 20
21 MDS descriptors We work now with strings over the following alphabet: Γ k = { (b,e), (b,i), (i,e) 2 i k } { (i,j) 2 i < j k } Any signed string over the alphabet Γ k is called an MDS descriptor Example: (b,2)(e,b)(2,3) is an MDS descriptor Example: (b,2)(b,3)(b,4) is also an MDS descriptor We need to consider only realistic MDS descriptors 21
22 Denote the mapping bellow by ψ From generic formalism to MDS descriptors M i,j (i,j+1), 1<i j<k M i,j (j+1,i), 1<i j<k M 1,j (b,j+1), 1 j<k M 1,j (j+1,b), 1 j<k M i,k (i,e), 1<i k M i,k (e,i), 1<i k M 1,k (b,e) M 1,k (e,b) An MDS descriptor is realistic if it is the image through ψ of a realistic MDS arrangement 22
23 MDS descriptors: Example The realistic MDS descriptor associated to the actin I gene in O.nova is (3,4)(4,5)(6,7)(5,6)(7,8)(9,e) (-3,-2)(b,2)(8,9) The realistic MDS descriptor associated to the realistic MDS arrangement M 3,5 M 9,11 M 1,2 M 12 M 6,8 is: (3,6)(-12,-9)(b,3)(12,e)(-9,-6) 23
24 Realistic MDS descriptors Let δ=(x 1,x 2 )(x 3,x 4 ) (x 2n-1,x 2n ) be a realistic MDS descriptor: (x 2i- 1,x 2i ) k k We say that x 2i-1 is a left occurrence in δ and x 2i is a right occurrence in δ A pointer p occurs in δ if there is i such that x i =p Note: For an MDS descriptor δ and a pair (p,q) occurring in δ, we have: p k { b,e } if and only if q k { b,e } p k { b,e } if and only if q k { b,e } Let (p,q) Γ k If (p,q) occurs in δ, then p is called incoming and q is called outgoing If (-q,-p) occurs in δ, then p is called incoming and q is called outgoing 24
25 Realistic MDS descriptors Theorem: For a realistic MDS descriptor δ and a pointer p, δ has either 0 or 2 occurrences from the pointer set {p,-p} If both p and -p occur in δ, then p is called a positive pointer: here, either some pairs (p,q), (-p,-r), or some pairs (r,p), (-q,-p) occur in δ Otherwise (either p, or -p occur twice in δ), p is called a negative pointer: here, either some pairs (p,q), (r,p), or some pairs (-p,-r), (-q,-p) occur in δ 25
26 Realistic MDS descriptors Theorem: Let δ be a realistic MDS descriptor. Then: δ has exactly one occurrence form {b,-b} and one from {e,-e} Each pointer p has either 0 or 2 occurrences in δ A negative pointer has one left and one right occurrence in δ A positive pointer has either two left, or two right occurrences in δ If δ= δ 1 (x,y)δ 2, with (x,y) {(b,e),(-e,-b)}, then δ 1 = δ 2 =Λ 26
27 Take each of the operations Translating the molecular operations to realistic MDS descriptors Discuss for each of the operation the situations when the pointers involved are incoming or outgoing 27
28 The three molecular operations: LD, HI, DLAD (fold and recombine) LD (one piece of DNA is excised) HI (one piece of DNA is inverted) DLAD (two pieces of DNA exchange places) 28
29 Ld on realistic MDS descriptors If ld is applied in a successful assembly, then it must always be simple, so that no MDS is lost Simple ld: between the two occurrences of the pointer there are either no MDSs (just one IES), or the whole gene In the first case: excise a circular molecule consisting of one IES only In the second case: boundary application of ld the circular molecule contains the whole gene; in this case the gene will be assembled on a circular molecule 29
30 Ld on realistic MDS descriptors Case 1: simple ld one IES only separates the two occurrences of p Case 2: boundary ld the gene is bounded by the two occurrences of p 30
31 Formalizing the operations for MDS descriptors: LD ld p ( δ1 (q,p) (p,r) δ2 ) = δ1 (q,r) δ2 ld p ( (p,r) δ (s,p) ) = (s,r) δ (linear molecule) (circular molecule) LD: 31
32 Hi on realistic MDS descriptors Case 1: the first occurrence of p is as an incoming pointer (and then, also the second one) Case 2: the first occurrence of p is as an outgoing pointer (and then, also the second one) Result: the DNA sequence between the two pointers gets reverted 32
33 ld p ( δ1 (q,p) (p,r) δ2 ) = δ1 (q,r) δ2 ld p ( (p,r) δ (s,p) ) = (s,r) δ hi p ( δ1 (p,q) δ2 (-p,-r) δ3 ) = δ1 rs(δ2) (-q,-r) δ3 hi p ( δ1 (q,p) δ2 (-r,-p) δ3 ) = δ1 (q,r) rs(δ2) δ3 Formalizing the operations for MDS descriptors: HI HI: 33
34 Dlad on realistic MDS descriptors Four main cases: the first occurrence of p is incoming/outgoing and the first occurrence of q is incoming/outgoing Result: the two sequences of DNA bounded by p and q will change places 34
35 Dlad on MDS descriptors 1. The first occurrence of p is incoming, the first occurrence of q is incoming 2. The first occurrence of p is incoming, the first occurrence of q is outgoing 3. The first occurrence of p is outgoing, the first occurrence of q is incoming 4. The first occurrence of p is outgoing, the first occurrence of q is outgoing 35
36 Dlad on MDS descriptors 1. The first occurrence of p is incoming, the first occurrence of q is incoming 2. The first occurrence of p is incoming, the first occurrence of q is outgoing 3. The first occurrence of p is outgoing, the first occurrence of q is incoming 4. The first occurrence of p is outgoing, the first occurrence of q is outgoing 36
37 Dlad on MDS descriptors 1. dlad p,q (δ 1 (p,r 1 )δ 2 (q,r 2 )δ 3 (r 3,p)δ 4 (r 4,q)δ 5 ) = δ 1 δ 4 (r 4,r 2 )δ 3 (r 3,r 1 )δ 2 δ 5 2. dlad p,q (δ 1 (p,r 1 )δ 2 (r 2,q)δ 3 (r 3,p)δ 4 (q,r 4 )δ 5 ) = δ 1 δ 4 δ 3 (r 3,r 1 )δ 2 (r 2,r 4 )δ 5 3. dlad p,q (δ 1 (r 1,p)δ 2 (q,r 2 )δ 3 (p,r 3 )δ 4 (r 4,q)δ 5 ) = δ 1 (r 1,r 3 )δ 4 (r 4,r 2 )δ 3 δ 2 δ 5 4. dlad p,q (δ 1 (r 1,p)δ 2 (r 2,q)δ 3 (p,r 3 )δ 4 (q,r 4 )δ 5 ) = δ 1 (r 1,r 3 )δ 4 δ 3 δ 2 (r 2,r 4 )δ 5 37
38 Dlad on MDS descriptors 5. dlad p,q (δ 1 (p,r 1 )δ 2 (q, p)δ 4 (r 4,q)δ 5 ) = δ 1 δ 4 (r 4,r 1 )δ 2 δ 5 6. dlad p,q (δ 1 (p,q)δ 3 (r 3,p)δ 4 (q,r 4 )δ 5 ) = δ 1 δ 4 δ 3 (r 3,r 4 )δ 5 7. dlad p,q (δ 1 (r 1,p)δ 2 (q,r 2 )δ 3 (p,q)δ 5 ) = δ 1 (r 1,r 2 )δ 3 δ 2 δ 5 38
39 Dlad on realistic MDS descriptors 1. dlad p,q (δ 1 (p,r 1 )δ 2 (q,r 2 )δ 3 (r 3,p)δ 4 (r 4,q)δ 5 ) = δ 1 δ 4 (r 4,r 2 )δ 3 (r 3,r 1 )δ 2 δ 5 2. dlad p,q (δ 1 (p,r 1 )δ 2 (r 2,q)δ 3 (r 3,p)δ 4 (q,r 4 )δ 5 ) = δ 1 δ 4 δ 3 (r 3,r 1 )δ 2 (r 2,r 4 )δ 5 3. dlad p,q (δ 1 (r 1,p)δ 2 (q,r 2 )δ 3 (p,r 3 )δ 4 (r 4,q)δ 5 ) = δ 1 (r 1,r 3 )δ 4 (r 4,r 2 )δ 3 δ 2 δ 5 4. dlad p,q (δ 1 (r 1,p)δ 2 (r 2,q)δ 3 (p,r 3 )δ 4 (q,r 4 )δ 5 ) = δ 1 (r 1,r 3 )δ 4 δ 3 δ 2 (r 2,r 4 )δ 5 5. dlad p,q (δ 1 (p,r 1 )δ 2 (q, p)δ 4 (r 4,q)δ 5 ) = δ 1 δ 4 (r 4,r 1 )δ 2 δ 5 6. dlad p,q (δδ 1 (p,q)δδ 3 (r 3,p)δδ 4 (q,r 4 )δδ 5 ) = δ 1 δ 4 δ 3 (r 3,r 4 )δδ 5 7. dlad p,q (δ 1 (r 1,p)δ 2 (q,r 2 )δ 3 (p,q)δ 5 ) = δ 1 (r 1,r 2 )δ 3 δ 2 δ 5 39
40 Gene assembly as a transformation of MDS descriptors ld p ( δ1 (q,p) (p,r) δ2 ) = δ1 (q,r) δ2 ld p ( (p,r) δ (s,p) ) = (s,r) δ hi p ( δ1 (p,q) δ2 (-p,r) δ3 ) = δ1 rs(δ2) (q,r) δ3 hi p ( δ1 (q,p) δ2 (r,-p) δ3 ) = δ1 (q,r) rs(δ2) δ3 dlad p,q (δ1(p,r1)δ2(q,r2)δ3(r3,p)δ4(r4,q)δ5) = δ1δ4(r4,r2)δ3(r3,r1)δ2δ5 dlad p,q (δ1(p,r1)δ2(r2,q)δ3(r3,p)δ4(q,r4)δ5) = δ1δ4δ3(r3,r1)δ2(r2,r4)δ5 dlad p,q (δ1(r1,p)δ2(q,r2)δ3(p,r3)δ4(r4,q)δ5) = δ1(r1,r3)δ4(r4,r2)δ3δ2δ5 dlad p,q (δ1(r1,p)δ2(r2,q)δ3(p,r3)δ4(q,r4)δ5) = δ1(r1,r3)δ4δ3δ2(r2,r4)δ5 dlad p,q (δ1(p,r1)δ2(q,p) δ4(r4,q)δ5) = δ1δ4(r4,r1) δ2δ5 dlad p,q (δ1(p, q)δ3(r3,p)δ4(q,r4)δ5) = δ1δ4δ3(r3,r4) δ5 dlad p,q (δ1(r1,p)δ2(q,r2)δ3(p, q)δ5) = δ1(r1,r2)δ3δ2δ5 40
41 Assembly strategies A composition φ of operations ld, hi, and dlad is an assembly strategy for the MDS descriptor u if φ(u) is an assembled MDS descriptor (i.e. (b,e) or (-e,-b)) 41
42 The MDS descriptor associated to the actin I gene in S.nova is δ=(3,4)(4,5)(6,7)(5,6)(7,8) (9,e)(-3,-2)(b,2)(8,9) Ld 4 is applicable to δ: Ld 4 (δ)=(3,5)(6,7)(5,6)(7,8)(9,e)(-3,-2)(b,2)(8,9) Hi -2 is applicable to δ: Hi -2 (δ)=(3,4)(4,5)(6,7)(5,6)(7,8) (9,e)(-3,-b)(8,9) Hi 3 is applicable to δ: Hi 3 (δ)=(-e,-9)(-8,-7)(-6,-5)(-7,-6)(-5,-4)(-4,-2)(b,2)(8,9) Dlad 5,6 is applicable to δ: Dlad 5,6 (δ)=(3,4)(4,7)(7,8)(9,e)(-3,-2)(b,2)(8,9) Example 42
43 Example δ=(4,5)(6,e)(-2,-b)(5,6)(-4,-3)(-3,-2) dlad 5,-2 is applicable to δ: 43
44 Example δ=(4,5)(6,e)(-2,-b)(5,6)(-4,-3)(-3,-2) dlad 5,-2 is applicable to δ: dlad 5,-2 (δ)=(4,6)(-4,-3)(-3,-b)(6,e) 44
45 Example Actin I gene in S.nova is δ=(3,4)(4,5)(6,7)(5,6)(7,8)(9,e)(-3,-2)(b,2)(8,9) A successful reduction of δ is: Ld 4 (δ)=(3,5)(6,7)(5,6)(7,8)(9,e)(-3,-2)(b,2)(8,9) Dlad 5,6 (ld 4 (δ))=(3,7)(7,8)(9,e)(-3,-2)(b,2)(8,9) Ld 7(dlad 5,6(ld 4(δ)))=(3,8)(9,e)(-3,-2)(b,2)(8,9) δ Dlad 8,9 (ld 7 (dlad 5,6 (ld 4 (δ))))=(3,e)(-3,-2)(b,2) Hi -2 (dlad 8,9 (ld 7 (dlad 5,6 (ld 4 (δ)))))=(3,e)(-3,-b) Hi 3 (hi 2 (dlad 8,9 (ld 7 (dlad 5,6 (ld 4 (δ))))))=(-e,-b) 45
46 Translating the operations to realistic MDS descriptors From molecular operations based on patterns, folding, and splicing we went to a formal calculus on pairs of letters The gene assembly process is now a formal rewriting process based on three rules The input of the process: a realistic MDS descriptor The output of the process: the sequence of rewriting rules that transforms the input into (b,e) or (e,b); any such sequence is called a successful reduction Advantage: one can reason in formal terms about the process of gene assembly Note: Although the IESs are ignored in this rewriting calculus, note that they can be easily considered in the operations In dealing with certain applications (invariants) we will redefine the operations to keep track of the IESs also 46
47 Universality result Universality: Any realistic MDS descriptor has a successful reduction Consequence: Any micronuclear ciliate gene can be successfully assembled using a sequence of ld, hi, and dlad 47
48 Proof: Universality result For any realistic MDS descriptor δ, there is an operation applicable to it (thus reducing its length) If δ has a positive pointer, then apply hi to δ on that pointer; otherwise, all pointers are negative If δ has any alternating direct repeat pattern ( p q p q ), then apply dlad on p an q Otherwise, consider a (negative) pointer p of δ such that the distance (in number of pointers) between the two occurrences of p in δ is minimal Then the distance must be 0 and so, ld p is applicable to δ 48
49 Real genes Summary Level 1 Abstraction from pointers Generic formalism: MDS arrangements MDS M i,j Abstraction from real DNA sequences, IESs and MDS content Abstraction from order numbers Permutations (we will not consider them any further during the course) Level 2 MDS descriptors MDS (i,j+1) Abstraction from MDSs Strings MDS i j+1 49
COMPUTATIONAL PROCESSES IN LIVING CELLS
COMPUTATIONAL PROCESSES IN LIVING CELLS Lecture 7: Formal Systems for Gene Assembly in Ciliates: the String Pointer Reduction System March 31, 2010 MDS-descriptors MDS descriptors: strings over the following
More informationPatterns of Simple Gene Assembly in Ciliates
Patterns of Simple Gene Assembly in Ciliates Tero Harju Department of Mathematics, University of Turku Turku 20014 Finland harju@utu.fi Ion Petre Academy of Finland and Department of Information Technologies
More informationCOMPUTATIONAL PROCESSES IN LIVING CELLS
COMPUTATIONAL PROCESSES IN LIVING CELLS Lecture 9: Equivalence between the three Pointer Reduction Systems: MDS descriptor, String, and Graph April 15, 2010 Gene assembly in ciliates: the LD operation
More informationComplexity Measures for Gene Assembly
Tero Harju Chang Li Ion Petre Grzegorz Rozenberg Complexity Measures for Gene Assembly TUCS Technical Report No 781, September 2006 Complexity Measures for Gene Assembly Tero Harju Department of Mathematics,
More informationComputational nature of gene assembly in ciliates
Computational nature of gene assembly in ciliates Robert Brijder 1, Mark Daley 2, Tero Harju 3, Natasha Jonoska 4, Ion Petre 5, and Grzegorz Rozenberg 1,6 1 Leiden Institute of Advanced Computer Science,
More informationTheoretical Computer Science. Rewriting rule chains modeling DNA rearrangement pathways
Theoretical Computer Science 454 (2012) 5 22 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Rewriting rule chains modeling
More informationTwo models for gene assembly in ciliates
Two models for gene assembly in ciliates Tero Harju 1,3, Ion Petre 2,3, and Grzegorz Rozenberg 4 1 Deartment of Mathematics, University of Turku Turku 20014 Finland harju@utu.fi 2 Deartment of Comuter
More informationModels of Natural Computation: Gene Assembly and Membrane Systems. Robert Brijder
Models of Natural Computation: Gene Assembly and Membrane Systems Robert Brijder The work in this thesis has been carried out under the auspices of the research school IPA (Institute for Programming research
More informationX-MA2C01-1: Partial Worked Solutions
X-MAC01-1: Partial Worked Solutions David R. Wilkins May 013 1. (a) Let A, B and C be sets. Prove that (A \ (B C)) (B \ C) = (A B) \ C. [Venn Diagrams, by themselves without an accompanying logical argument,
More informationTheoretical Computer Science
Theoretical Computer Science 411 (2010) 919 925 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Algorithmic properties of ciliate sequence
More informationCombinatorial models for DNA rearrangements in ciliates
University of South Florida Scholar Commons Graduate Theses and Dissertations Graduate School 2009 Combinatorial models for DNA rearrangements in ciliates Angela Angeleska University of South Florida Follow
More informationUNIT-III REGULAR LANGUAGES
Syllabus R9 Regulation REGULAR EXPRESSIONS UNIT-III REGULAR LANGUAGES Regular expressions are useful for representing certain sets of strings in an algebraic fashion. In arithmetic we can use the operations
More informationPacket #1: Logic & Proofs. Applied Discrete Mathematics
Packet #1: Logic & Proofs Applied Discrete Mathematics Table of Contents Course Objectives Page 2 Propositional Calculus Information Pages 3-13 Course Objectives At the conclusion of this course, you should
More informationAccepting H-Array Splicing Systems and Their Properties
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 21 Number 3 2018 298 309 Accepting H-Array Splicing Systems and Their Properties D. K. SHEENA CHRISTY 1 V.MASILAMANI 2 D. G. THOMAS 3 Atulya
More informationFinite Automata and Formal Languages
Finite Automata and Formal Languages TMV26/DIT32 LP4 2 Lecture 6 April 5th 2 Regular expressions (RE) are an algebraic way to denote languages. Given a RE R, it defines the language L(R). Actually, they
More informationDiscrete Applied Mathematics. Maximal pivots on graphs with an application to gene assembly
Discrete Applied Mathematics 158 (2010) 1977 1985 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Maximal pivots on graphs with an application
More informationAutomata & languages. A primer on the Theory of Computation. Laurent Vanbever. ETH Zürich (D-ITET) September,
Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu ETH Zürich (D-ITET) September, 24 2015 Last week was all about Deterministic Finite Automaton We saw three main
More informationAutomata Theory and Formal Grammars: Lecture 1
Automata Theory and Formal Grammars: Lecture 1 Sets, Languages, Logic Automata Theory and Formal Grammars: Lecture 1 p.1/72 Sets, Languages, Logic Today Course Overview Administrivia Sets Theory (Review?)
More informationLinear Algebra. The analysis of many models in the social sciences reduces to the study of systems of equations.
POLI 7 - Mathematical and Statistical Foundations Prof S Saiegh Fall Lecture Notes - Class 4 October 4, Linear Algebra The analysis of many models in the social sciences reduces to the study of systems
More informationGraph Polynomials motivated by Gene Assembly
Colloquium USF Tampa Jan Graph Polynomials motivated by Gene Assembly Hendrik Jan Hoogeboom, Leiden NL with Robert Brijder, Hasselt B transition polynomials assembly polynomial of G w for doc-word w S(G
More informationPart I. Gene Assembly in Ciliates
Part I Gene Assembly in Ciliates Chater 2 Reducibility of Gene Patterns in Ciliates using the Breakoint Grah Abstract Gene assembly in ciliates is one of the most involved DNA rocessings going on in any
More informationExploring Phylogenetic Relationships in Drosophila with Ciliate Operations
Exploring Phylogenetic Relationships in Drosophila with Ciliate Operations Jacob Herlin, Anna Nelson, and Dr. Marion Scheepers Department of Mathematical Sciences, University of Northern Colorado, Department
More informationCS 581: Introduction to the Theory of Computation! Lecture 1!
CS 581: Introduction to the Theory of Computation! Lecture 1! James Hook! Portland State University! hook@cs.pdx.edu! http://www.cs.pdx.edu/~hook/cs581f10/! Welcome!! Contact Information! Jim Hook! Office:
More informationCONTRAfold: RNA Secondary Structure Prediction without Physics-Based Models
Supplementary Material for CONTRAfold: RNA Secondary Structure Prediction without Physics-Based Models Chuong B Do, Daniel A Woods, and Serafim Batzoglou Stanford University, Stanford, CA 94305, USA, {chuongdo,danwoods,serafim}@csstanfordedu,
More informationRecombination Faults in Gene Assembly in Ciliates Modeled Using Multimatroids
Recombination Faults in Gene Assembly in Ciliates Modeled Using Multimatroids Robert Brijder 1 Hasselt University and Transnational University of Limburg, Belgium Abstract We formally model the process
More informationFinite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018
Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Lecture 14 Ana Bove May 14th 2018 Recap: Context-free Grammars Simplification of grammars: Elimination of ǫ-productions; Elimination of
More informationChapter 6. Properties of Regular Languages
Chapter 6 Properties of Regular Languages Regular Sets and Languages Claim(1). The family of languages accepted by FSAs consists of precisely the regular sets over a given alphabet. Every regular set is
More information1 Alphabets and Languages
1 Alphabets and Languages Look at handout 1 (inference rules for sets) and use the rules on some examples like {a} {{a}} {a} {a, b}, {a} {{a}}, {a} {{a}}, {a} {a, b}, a {{a}}, a {a, b}, a {{a}}, a {a,
More informationTheory of Computation
Theory of Computation Dr. Sarmad Abbasi Dr. Sarmad Abbasi () Theory of Computation 1 / 38 Lecture 21: Overview Big-Oh notation. Little-o notation. Time Complexity Classes Non-deterministic TMs The Class
More informationGroups. 3.1 Definition of a Group. Introduction. Definition 3.1 Group
C H A P T E R t h r e E Groups Introduction Some of the standard topics in elementary group theory are treated in this chapter: subgroups, cyclic groups, isomorphisms, and homomorphisms. In the development
More informationNondeterministic Finite Automata
Nondeterministic Finite Automata Mahesh Viswanathan Introducing Nondeterminism Consider the machine shown in Figure. Like a DFA it has finitely many states and transitions labeled by symbols from an input
More informationCS:4330 Theory of Computation Spring Regular Languages. Finite Automata and Regular Expressions. Haniel Barbosa
CS:4330 Theory of Computation Spring 2018 Regular Languages Finite Automata and Regular Expressions Haniel Barbosa Readings for this lecture Chapter 1 of [Sipser 1996], 3rd edition. Sections 1.1 and 1.3.
More informationThe q-exponential generating function for permutations by consecutive patterns and inversions
The q-exponential generating function for permutations by consecutive patterns and inversions Don Rawlings Abstract The inverse of Fedou s insertion-shift bijection is used to deduce a general form for
More informationLinear Equations and Matrix
1/60 Chia-Ping Chen Professor Department of Computer Science and Engineering National Sun Yat-sen University Linear Algebra Gaussian Elimination 2/60 Alpha Go Linear algebra begins with a system of linear
More informationreview To find the coefficient of all the terms in 15ab + 60bc 17ca: Coefficient of ab = 15 Coefficient of bc = 60 Coefficient of ca = -17
1. Revision Recall basic terms of algebraic expressions like Variable, Constant, Term, Coefficient, Polynomial etc. The coefficients of the terms in 4x 2 5xy + 6y 2 are Coefficient of 4x 2 is 4 Coefficient
More informationSource Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria
Source Coding Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Asymptotic Equipartition Property Optimal Codes (Huffman Coding) Universal
More informationXMA2C011, Annual Examination 2012: Worked Solutions
XMA2C011, Annual Examination 2012: Worked Solutions David R. Wilkins 1. (a) Let A, B and C be sets. Prove that A (B \ C) = (A B) \ (A C). We show that every element of A (B \ C) is an element of (A B)
More informationSepinoud Azimi. Computational Models for and from Biology. Simple Gene Assembly and Reaction Systems. Turku Centre for Computer Science
Sepinoud Azimi Computational Models for and from Biology Simple Gene Assembly and Reaction Systems Turku Centre for Computer Science TUCS Dissertations No 205, November 2015 Computational Models for and
More informationLinear Algebra March 16, 2019
Linear Algebra March 16, 2019 2 Contents 0.1 Notation................................ 4 1 Systems of linear equations, and matrices 5 1.1 Systems of linear equations..................... 5 1.2 Augmented
More informationSchool of Mathematics and Statistics. MT5824 Topics in Groups. Problem Sheet I: Revision and Re-Activation
MRQ 2009 School of Mathematics and Statistics MT5824 Topics in Groups Problem Sheet I: Revision and Re-Activation 1. Let H and K be subgroups of a group G. Define HK = {hk h H, k K }. (a) Show that HK
More informationQuantum Mechanics II
Quantum Mechanics II Prof. Boris Altshuler April, 20 Lecture 2. Scattering Theory Reviewed Remember what we have covered so far for scattering theory. We separated the Hamiltonian similar to the way in
More informationEntropy. Probability and Computing. Presentation 22. Probability and Computing Presentation 22 Entropy 1/39
Entropy Probability and Computing Presentation 22 Probability and Computing Presentation 22 Entropy 1/39 Introduction Why randomness and information are related? An event that is almost certain to occur
More informationA PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS
A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS CRYSTAL L. KAHN and BENJAMIN J. RAPHAEL Box 1910, Brown University Department of Computer Science & Center for Computational Molecular Biology
More informationComputational Models - Lecture 3 1
Computational Models - Lecture 3 1 Handout Mode Iftach Haitner and Yishay Mansour. Tel Aviv University. March 13/18, 2013 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice
More informationWhat we have done so far
What we have done so far DFAs and regular languages NFAs and their equivalence to DFAs Regular expressions. Regular expressions capture exactly regular languages: Construct a NFA from a regular expression.
More informationLinear Programming in Matrix Form
Linear Programming in Matrix Form Appendix B We first introduce matrix concepts in linear programming by developing a variation of the simplex method called the revised simplex method. This algorithm,
More informationLecture 4: Hidden Markov Models: An Introduction to Dynamic Decision Making. November 11, 2010
Hidden Lecture 4: Hidden : An Introduction to Dynamic Decision Making November 11, 2010 Special Meeting 1/26 Markov Model Hidden When a dynamical system is probabilistic it may be determined by the transition
More informationIntroduction to Theory of Computing
CSCI 2670, Fall 2012 Introduction to Theory of Computing Department of Computer Science University of Georgia Athens, GA 30602 Instructor: Liming Cai www.cs.uga.edu/ cai 0 Lecture Note 3 Context-Free Languages
More informationLecture 3: Big-O and Big-Θ
Lecture 3: Big-O and Big-Θ COSC4: Algorithms and Data Structures Brendan McCane Department of Computer Science, University of Otago Landmark functions We saw that the amount of work done by Insertion Sort,
More informationThe Minimal Rank Problem for Finite Fields. Wayne Barrett (BYU) Hein van der Holst (Eindhoven) Raphael Loewy (Technion) Don March (BYU)
The Minimal Rank Problem for Finite Fields Wayne Barrett (BYU) Hein van der Holst (Eindhoven) Raphael Loewy (Technion) Don March (BYU) 12th ILAS Meeting - Regina June 26-29, 2005 References [BvdHL1] Barrett,
More informationDynamic Programming: Shortest Paths and DFA to Reg Exps
CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths
More informationFORMAL LANGUAGES, AUTOMATA AND COMPUTATION
FORMAL LANGUAGES, AUTOMATA AND COMPUTATION IDENTIFYING NONREGULAR LANGUAGES PUMPING LEMMA Carnegie Mellon University in Qatar (CARNEGIE MELLON UNIVERSITY IN QATAR) SLIDES FOR 15-453 LECTURE 5 SPRING 2011
More informationNumerical Analysis Lecture Notes
Numerical Analysis Lecture Notes Peter J Olver 3 Review of Matrix Algebra Vectors and matrices are essential for modern analysis of systems of equations algebrai, differential, functional, etc In this
More informationFinite Automata and Formal Languages TMV026/DIT321 LP4 2012
Finite Automata and Formal Languages TMV26/DIT32 LP4 22 Lecture 7 Ana Bove March 27th 22 Overview of today s lecture: Regular Expressions From FA to RE Regular Expressions Regular expressions (RE) are
More informationClarifications from last time. This Lecture. Last Lecture. CMSC 330: Organization of Programming Languages. Finite Automata.
CMSC 330: Organization of Programming Languages Last Lecture Languages Sets of strings Operations on languages Finite Automata Regular expressions Constants Operators Precedence CMSC 330 2 Clarifications
More informationElementary Linear Algebra
Matrices J MUSCAT Elementary Linear Algebra Matrices Definition Dr J Muscat 2002 A matrix is a rectangular array of numbers, arranged in rows and columns a a 2 a 3 a n a 2 a 22 a 23 a 2n A = a m a mn We
More informationDiscrete Mathematics & Mathematical Reasoning Chapter 6: Counting
Discrete Mathematics & Mathematical Reasoning Chapter 6: Counting Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 39 Chapter Summary The Basics
More informationSystems of Identical Particles
qmc161.tex Systems of Identical Particles Robert B. Griffiths Version of 21 March 2011 Contents 1 States 1 1.1 Introduction.............................................. 1 1.2 Orbitals................................................
More informationDecision Problems with TM s. Lecture 31: Halting Problem. Universe of discourse. Semi-decidable. Look at following sets: CSCI 81 Spring, 2012
Decision Problems with TM s Look at following sets: Lecture 31: Halting Problem CSCI 81 Spring, 2012 Kim Bruce A TM = { M,w M is a TM and w L(M)} H TM = { M,w M is a TM which halts on input w} TOTAL TM
More informationChapter 2. Mathematical Reasoning. 2.1 Mathematical Models
Contents Mathematical Reasoning 3.1 Mathematical Models........................... 3. Mathematical Proof............................ 4..1 Structure of Proofs........................ 4.. Direct Method..........................
More informationStatistics 992 Continuous-time Markov Chains Spring 2004
Summary Continuous-time finite-state-space Markov chains are stochastic processes that are widely used to model the process of nucleotide substitution. This chapter aims to present much of the mathematics
More informationStructure-Based Comparison of Biomolecules
Structure-Based Comparison of Biomolecules Benedikt Christoph Wolters Seminar Bioinformatics Algorithms RWTH AACHEN 07/17/2015 Outline 1 Introduction and Motivation Protein Structure Hierarchy Protein
More informationAutomata: a short introduction
ILIAS, University of Luxembourg Discrete Mathematics II May 2012 What is a computer? Real computers are complicated; We abstract up to an essential model of computation; We begin with the simplest possible
More informationCOSE312: Compilers. Lecture 2 Lexical Analysis (1)
COSE312: Compilers Lecture 2 Lexical Analysis (1) Hakjoo Oh 2017 Spring Hakjoo Oh COSE312 2017 Spring, Lecture 2 March 12, 2017 1 / 15 Lexical Analysis ex) Given a C program float match0 (char *s) /* find
More informationEnumeration Schemes for Words Avoiding Permutations
Enumeration Schemes for Words Avoiding Permutations Lara Pudwell November 27, 2007 Abstract The enumeration of permutation classes has been accomplished with a variety of techniques. One wide-reaching
More informationThe Algebra of Gene Assembly in Ciliates
The Algebra of Gene Assembly in Ciliates Robert Brijder and Hendrik Jan Hoogeboom Abstract The formal theory of intramolecular gene assembly in ciliates is fitted into the well-established theories of
More informationREVERSALS ON SFT S. 1. Introduction and preliminaries
Trends in Mathematics Information Center for Mathematical Sciences Volume 7, Number 2, December, 2004, Pages 119 125 REVERSALS ON SFT S JUNGSEOB LEE Abstract. Reversals of topological dynamical systems
More information6.842 Randomness and Computation Lecture 5
6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its
More informationAuthor: Vivek Kulkarni ( )
Author: Vivek Kulkarni ( vivek_kulkarni@yahoo.com ) Chapter-2: Finite State Machines Solutions for Review Questions @ Oxford University Press 2013. All rights reserved. 1 Q.1 Construct Mealy and Moore
More informationAutomata Theory. Lecture on Discussion Course of CS120. Runzhe SJTU ACM CLASS
Automata Theory Lecture on Discussion Course of CS2 This Lecture is about Mathematical Models of Computation. Why Should I Care? - Ways of thinking. - Theory can drive practice. - Don t be an Instrumentalist.
More informationSummary of Chapters 1-3. Equations of motion for a uniformly acclerating object. Quiz to follow
Summary of Chapters 1-3 Equations of motion for a uniformly acclerating object Quiz to follow An unbalanced force acting on an object results in its acceleration Accelerated motion in time, t, described
More informationTheory of Computation
Theory of Computation COMP363/COMP6363 Prerequisites: COMP4 and COMP 6 (Foundations of Computing) Textbook: Introduction to Automata Theory, Languages and Computation John E. Hopcroft, Rajeev Motwani,
More informationLecture 20 : Markov Chains
CSCI 3560 Probability and Computing Instructor: Bogdan Chlebus Lecture 0 : Markov Chains We consider stochastic processes. A process represents a system that evolves through incremental changes called
More informationMTAT Complexity Theory September 15th, Lecture 3
MTAT.07.004 Complexity Theory September 15th, 2011 Lecturer: Peeter Laud Lecture 3 Scribe(s): Ilya Kuzovkin Introduction During this lecture we went through proofs for four theorems. Multi-tape Turing
More informationPlease give details of your answer. A direct answer without explanation is not counted.
Please give details of your answer. A direct answer without explanation is not counted. Your answers must be in English. Please carefully read problem statements. During the exam you are not allowed to
More informationAutomata Theory, Computability and Complexity
Automata Theory, Computability and Complexity Mridul Aanjaneya Stanford University June 26, 22 Mridul Aanjaneya Automata Theory / 64 Course Staff Instructor: Mridul Aanjaneya Office Hours: 2:PM - 4:PM,
More informationComputational Models - Lecture 3
Slides modified by Benny Chor, based on original slides by Maurice Herlihy, Brown University. p. 1 Computational Models - Lecture 3 Equivalence of regular expressions and regular languages (lukewarm leftover
More informationBME 5742 Biosystems Modeling and Control
BME 5742 Biosystems Modeling and Control Lecture 24 Unregulated Gene Expression Model Dr. Zvi Roth (FAU) 1 The genetic material inside a cell, encoded in its DNA, governs the response of a cell to various
More informationLecture 3: Markov chains.
1 BIOINFORMATIK II PROBABILITY & STATISTICS Summer semester 2008 The University of Zürich and ETH Zürich Lecture 3: Markov chains. Prof. Andrew Barbour Dr. Nicolas Pétrélis Adapted from a course by Dr.
More informationVectors and matrices: matrices (Version 2) This is a very brief summary of my lecture notes.
Vectors and matrices: matrices (Version 2) This is a very brief summary of my lecture notes Matrices and linear equations A matrix is an m-by-n array of numbers A = a 11 a 12 a 13 a 1n a 21 a 22 a 23 a
More informationSolution to CS375 Homework Assignment 11 (40 points) Due date: 4/26/2017
Solution to CS375 Homework Assignment 11 (40 points) Due date: 4/26/2017 1. Find a Greibach normal form for the following given grammar. (10 points) S bab A BAa a B bb Ʌ Solution: (1) Since S does not
More informationCS632 Notes on Relational Query Languages I
CS632 Notes on Relational Query Languages I A. Demers 6 Feb 2003 1 Introduction Here we define relations, and introduce our notational conventions, which are taken almost directly from [AD93]. We begin
More informationCSE 468, Fall 2006 Homework solutions 1
CSE 468, Fall 2006 Homework solutions 1 Homework 1 Problem 1. (a) To accept digit strings that contain 481: Q ={λ,4,48, 481}, Σ ={0,1,...,9}, q 0 = λ, A ={481}. To define δ, weuse a for all letters (well,
More informationMath 320, spring 2011 before the first midterm
Math 320, spring 2011 before the first midterm Typical Exam Problems 1 Consider the linear system of equations 2x 1 + 3x 2 2x 3 + x 4 = y 1 x 1 + 3x 2 2x 3 + 2x 4 = y 2 x 1 + 2x 3 x 4 = y 3 where x 1,,
More information1 Determinants. 1.1 Determinant
1 Determinants [SB], Chapter 9, p.188-196. [SB], Chapter 26, p.719-739. Bellow w ll study the central question: which additional conditions must satisfy a quadratic matrix A to be invertible, that is to
More information. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.
CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy
More informationLorentz invariant scattering cross section and phase space
Chapter 3 Lorentz invariant scattering cross section and phase space In particle physics, there are basically two observable quantities : Decay rates, Scattering cross-sections. Decay: p p 2 i a f p n
More informationEquational Logic. Chapter Syntax Terms and Term Algebras
Chapter 2 Equational Logic 2.1 Syntax 2.1.1 Terms and Term Algebras The natural logic of algebra is equational logic, whose propositions are universally quantified identities between terms built up from
More informationThe structure of bull-free graphs II elementary trigraphs
The structure of bull-free graphs II elementary trigraphs Maria Chudnovsky Columbia University, New York, NY 10027 USA May 6, 2006; revised April 25, 2011 Abstract The bull is a graph consisting of a triangle
More information1 Matrices and Systems of Linear Equations
March 3, 203 6-6. Systems of Linear Equations Matrices and Systems of Linear Equations An m n matrix is an array A = a ij of the form a a n a 2 a 2n... a m a mn where each a ij is a real or complex number.
More information--------------------------------------------------------------------------------------------- Math 6023 Topics: Design and Graph Theory ---------------------------------------------------------------------------------------------
More informationCS5371 Theory of Computation. Lecture 5: Automata Theory III (Non-regular Language, Pumping Lemma, Regular Expression)
CS5371 Theory of Computation Lecture 5: Automata Theory III (Non-regular Language, Pumping Lemma, Regular Expression) Objectives Prove the Pumping Lemma, and use it to show that there are non-regular languages
More informationDynamic Programming. Shuang Zhao. Microsoft Research Asia September 5, Dynamic Programming. Shuang Zhao. Outline. Introduction.
Microsoft Research Asia September 5, 2005 1 2 3 4 Section I What is? Definition is a technique for efficiently recurrence computing by storing partial results. In this slides, I will NOT use too many formal
More information12.5 Equations of Lines and Planes
12.5 Equations of Lines and Planes Equation of Lines Vector Equation of Lines Parametric Equation of Lines Symmetric Equation of Lines Relation Between Two Lines Equations of Planes Vector Equation of
More informationTheoretical Computer Science. A comparison of graph-theoretic DNA hybridization models
Theoretical Computer Science 429 (2012) 46 53 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs A comparison of graph-theoretic
More informationMatrix Arithmetic. j=1
An m n matrix is an array A = Matrix Arithmetic a 11 a 12 a 1n a 21 a 22 a 2n a m1 a m2 a mn of real numbers a ij An m n matrix has m rows and n columns a ij is the entry in the i-th row and j-th column
More informationPowers and Products of Monomial Ideals
U.U.D.M. Project Report 6: Powers and Products of Monomial Ideals Melker Epstein Examensarbete i matematik, 5 hp Handledare: Veronica Crispin Quinonez Examinator: Jörgen Östensson Juni 6 Department of
More informationQuantum Information & Quantum Computation
CS9A, Spring 5: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 59 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs9/ Administrivia Who has the book already? Office hours: Wednesday
More informationAnalysis and Design of Algorithms Dynamic Programming
Analysis and Design of Algorithms Dynamic Programming Lecture Notes by Dr. Wang, Rui Fall 2008 Department of Computer Science Ocean University of China November 6, 2009 Introduction 2 Introduction..................................................................
More informationClifford Algebras and Spin Groups
Clifford Algebras and Spin Groups Math G4344, Spring 2012 We ll now turn from the general theory to examine a specific class class of groups: the orthogonal groups. Recall that O(n, R) is the group of
More information